HomeSort by relevance Sort by last modified time
    Searched refs:password_len (Results 1 - 25 of 48) sorted by null

1 2

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_otp.c 40 size_t password_len, len; local
51 password = eap_get_config_otp(sm, &password_len);
55 password = eap_get_config_password(sm, &password_len);
72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
76 wpabuf_put_data(resp, password, password_len);
78 password, password_len);
mschapv2.c 43 const u8 *password, size_t password_len,
71 password, password_len);
80 password, password_len);
83 password, password_len, nt_response);
84 generate_authenticator_response(password, password_len,
98 nt_password_hash(password, password_len, password_hash);
mschapv2.h 25 const u8 *password, size_t password_len,
eap_gtc.c 57 size_t password_len, identity_len, len, plen; local
83 password = eap_get_config_otp(sm, &password_len);
87 password = eap_get_config_password(sm, &password_len);
104 plen = password_len;
119 wpabuf_put_data(resp, password, password_len);
eap_md5.c 42 size_t len, challenge_len, password_len; local
44 password = eap_get_config_password(sm, &password_len);
95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
eap_leap.c 72 size_t identity_len, password_len, len; local
78 password = eap_get_config_password2(sm, &password_len, &pwhash);
126 nt_challenge_response(challenge, password, password_len, rpos);
196 size_t password_len, len; local
201 password = eap_get_config_password2(sm, &password_len, &pwhash);
238 nt_password_hash(password, password_len, pw_hash);
274 size_t password_len; local
277 password = eap_get_config_password(sm, &password_len);
334 size_t elen[5], password_len; local
340 password = eap_get_config_password2(sm, &password_len, &pwhash)
    [all...]
eap_config.h 71 * password_len - Length of password field
73 size_t password_len; member in struct:eap_peer_config
eap_mschapv2.c 161 size_t identity_len, password_len; local
168 password = eap_get_config_password2(sm, &password_len, &pwhash);
213 password_len, pwhash, auth_challenge,
309 config->password_len = 16;
318 config->password_len = config->new_password_len;
503 size_t username_len, password_len, new_password_len; local
510 password = eap_get_config_password2(sm, &password_len, &pwhash);
543 password, password_len, cp->encr_password))
558 password, password_len, cp->encr_hash);
eap_ikev2.c 68 size_t identity_len, password_len; local
93 password = eap_get_config_password(sm, &password_len);
95 data->ikev2.shared_secret = os_malloc(password_len);
98 os_memcpy(data->ikev2.shared_secret, password, password_len);
99 data->ikev2.shared_secret_len = password_len;
eap_ttls.c 646 size_t identity_len, password_len; local
652 password = eap_get_config_password2(sm, &password_len, &pwhash);
695 password_len, pwhash, challenge,
731 size_t identity_len, password_len; local
737 password = eap_get_config_password2(sm, &password_len, &pwhash);
781 nt_challenge_response(challenge, password, password_len,
784 password, password_len);
821 size_t identity_len, password_len; local
826 password = eap_get_config_password(sm, &password_len);
830 msg = wpabuf_alloc(identity_len + password_len + 100)
881 size_t identity_len, password_len; local
    [all...]
  /external/wpa_supplicant/
eap_otp.c 44 size_t password_len, len; local
57 password = eap_get_config_otp(sm, &password_len);
61 password = eap_get_config_password(sm, &password_len);
79 password_len, EAP_CODE_RESPONSE, req->identifier,
83 os_memcpy(rpos, password, password_len);
85 password, password_len);
ms_funcs.h 20 const u8 *password, size_t password_len,
27 void generate_authenticator_response(const u8 *password, size_t password_len,
38 size_t password_len, u8 *response);
42 void nt_password_hash(const u8 *password, size_t password_len,
eap_gtc.c 59 size_t password_len, identity_len, len, plen; local
86 password = eap_get_config_otp(sm, &password_len);
90 password = eap_get_config_password(sm, &password_len);
107 plen = password_len;
124 os_memcpy(rpos, password, password_len);
ms_funcs.c 55 * @password_len: Length of password
58 void nt_password_hash(const u8 *password, size_t password_len,
64 if (password_len > 256)
68 for (i = 0; i < password_len; i++) {
73 len = password_len * 2;
117 * @password_len: Length of password
122 const u8 *password, size_t password_len,
130 nt_password_hash(password, password_len, password_hash);
215 * @password_len: Length of password
224 void generate_authenticator_response(const u8 *password, size_t password_len,
    [all...]
eap_leap.c 74 size_t identity_len, password_len; local
79 password = eap_get_config_password(sm, &password_len);
126 nt_challenge_response(challenge, password, password_len, rpos);
201 size_t password_len; local
205 password = eap_get_config_password(sm, &password_len);
242 nt_password_hash(password, password_len, pw_hash);
278 size_t len, password_len; local
281 password = eap_get_config_password(sm, &password_len);
335 size_t elen[5], password_len; local
340 password = eap_get_config_password(sm, &password_len);
    [all...]
eap_md5.c 45 size_t len, challenge_len, password_len; local
49 password = eap_get_config_password(sm, &password_len);
104 elen[1] = password_len;
eap_mschapv2.c 183 const u8 *password, size_t password_len,
196 password, password_len);
199 password, password_len, nt_response);
204 generate_authenticator_response(password, password_len,
212 nt_password_hash(password, password_len, password_hash);
230 size_t username_len, identity_len, password_len; local
236 password = eap_get_config_password(sm, &password_len);
284 password, password_len,
380 config->password_len = config->new_password_len;
573 size_t username_len, password_len, new_password_len local
    [all...]
config_ssid.h 258 * password_len - Length of password field
260 size_t password_len; member in struct:wpa_ssid
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
ms_funcs.h 20 const u8 *password, size_t password_len,
27 void generate_authenticator_response(const u8 *password, size_t password_len,
38 size_t password_len, u8 *response);
42 void nt_password_hash(const u8 *password, size_t password_len,
51 const u8 *password, size_t password_len,
ms_funcs.c 55 * @password_len: Length of password
58 void nt_password_hash(const u8 *password, size_t password_len,
64 if (password_len > 256)
65 password_len = 256;
68 for (i = 0; i < password_len; i++) {
73 len = password_len * 2;
117 * @password_len: Length of password
122 const u8 *password, size_t password_len,
130 nt_password_hash(password, password_len, password_hash);
215 * @password_len: Length of passwor
    [all...]
  /external/dropbear/libtomcrypt/src/misc/pkcs5/
pkcs_5_2.c 22 @param password_len The length of the password (octets)
31 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) {
95 if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) {
pkcs_5_1.c 21 @param password_len The length of the password (octet)
29 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len,
66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_pkcs.h 74 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len,
80 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap.h 38 size_t password_len; member in struct:eap_user
eap_ttls.c 250 size_t password_len = dlen; local
251 while (password_len > 0 &&
252 password[password_len - 1] == '\0') {
253 password_len--;
257 password, password_len);
259 parse->user_password_len = password_len;
660 if (sm->user->password_len != user_password_len ||
679 size_t password_len)
685 password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) {
689 (unsigned long) password_len);
    [all...]

Completed in 1869 milliseconds

1 2